Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
b322bb67028be3c42ec11ceb75e05a92_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b322bb67028be3c42ec11ceb75e05a92_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b322bb67028be3c42ec11ceb75e05a92_JaffaCakes118.html
-
Size
26KB
-
MD5
b322bb67028be3c42ec11ceb75e05a92
-
SHA1
5c68dd78bb645f78720f025238d3f41f63273d28
-
SHA256
26d3161cde3b54f8abee48629a9607d90ce50e516f9046dd80c2c90bed7b0392
-
SHA512
51b419805daed323a13af424ac35c9489b76539057da904255f74108f620dd3a65f27b7a800eb8fe9a40982527af99e8b1155f6c1e6cd604c279daae388bb9b5
-
SSDEEP
192:uqNnXFb5nDOnQjxn5Q/6nQieBNnwnQOkEntCYnQTbnBnQRCJVevo7NtQFo+NzQ4+:nNQ/iygcfrDH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424697109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD91A981-2BCE-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b322bb67028be3c42ec11ceb75e05a92_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc254f14e15c75ff86b7ecb7caf5c0e6
SHA130be950523125b4e243b9168e73b781ce78af04d
SHA256398e3fa34e6e0542f0e45178667d9f9956cb9352b4b34539622719b8a9f96f03
SHA5124aacbcdf382f1741f72d213b29de4ef1cb31d3f8bc33ec2c2938d5a6553717801fd7f24a41dd7851eef819e591ae0071321e4f38f78f39ad1e931440922e2a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892a5fa25815355ce458b4e96506a63e
SHA1cabad5728be84990ce85d0852ec9cddd00305106
SHA2564a308488a3f57bcc471bbed3bae3cadd34fced14a6b59091da949a24b18fcde6
SHA5126f90688f5c6586398bd27bcaeed53a5eabeb6de47257e4643b270a5ecfa5e0281eb99ffa9f66df43ea268689e5186604a77ba21e8639b6a616d9146329c53138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58245d60f3c892181d2d602a40cfb2918
SHA1b837a749d37e7ff186aa1c821f70ee76e9a9e4f6
SHA256b248cfe7b48919ceb7df5575c2a0d0b5e9b9166654461de9e2fb4cfc8738901f
SHA5129e8e28de8288ed8c59217798351508a5235f41ce6f5ba41e0afd6df88dbcc48fc8c469b9147b2215600aff7b8e3a5f4e13d93cd1817d6046426c67a04f77781e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad5f7aec1e4597cdb1170566a67fbd6
SHA1fae704d8823a332249217439324869757d458d95
SHA2562de987b463f49db32f7eb66176e50b15acf7e75496eb33101cf68276f7b30f9c
SHA51220c8d42cb8dac534c8754e21bef563288fd3cd8fd26907a5f5297ff065d1f10298b59b4210b3e40a4d6580e1dc3ca9e80c80b5c0c68c1c4cac48e6de66d46d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3b3bbb1ccfe1e362aaff728d75b9d4
SHA1b7006d99be1ae40634478e8d945045f337712b41
SHA2567f3e861c325050050e27ac0858c55659a1ccf13ccfbdc7e1d1bbd26968a33f1c
SHA5125d55286a063ca8eec094f7bcccdbed08722df867d0cf5e663ac7fabfad85e585f4f84b1811b1972bd771d0e100d951c9bab98d587a29a47bcb394196285c4596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c7892348eab988ddaa9fe67ef2169b
SHA14572230bdab66d71738e498f8f9593a731d216bc
SHA2567b65f43fa62ce718cdc036157b61166c44c606e7b543ef25213dd9a4c81e4fe9
SHA512465f6b5f94ff477544d0a5da030fc0a2d7ec64dbf9b0214a976143429e2761f9dbdf7e612119844c418251bfaf9f44dc59af5a8bf29ef6a95a14a955adf52900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679fee8bdaa2b34da6e0d6c5c51530a3
SHA1813eb22513252f3ebd85c1cd926d18a059faa805
SHA256f1f241e9fb679d6246e71e461d18ea55ced20895191edb9f086a0d2b740b24cf
SHA512a3f2d201165efc06bbffd8f9c3f0ee94aa9dfc253a2d41e8b7df7d3e1d6feef0cf55ca2491c27a6b8d3aeb5720b041c8ee71ae66be97fb671a1af739cbbccb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525de90d143408a604b252e218929563
SHA15a060e0a7cab248286b603cce2613f197dacad22
SHA256ea3eaa71aeabf1b106994fa1e139f8400e8411e5826778d14bde7e7ec665c154
SHA512238f848c81d5d534fe92219766a6752abf27328c480f6e3b42b3f8b24a07c3ca5a2d9f781d17d8b82e7e4e8984b2ce6615d66bc588a07b0d6db7dc7f935b452a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6cec151bb9d7b7f548fd25e53c10f2
SHA11f5d48a239a34ffa4997204e654a534da4740d7a
SHA2560da2670219f6dc94f79b48a07b0d1284a1d3e1246eb8eea5858e331a4baa1589
SHA512a7ebb8ed258446afecd77cdf5950f96e040370622cf3c57fa95f2f4001a19abb9a0d9dd064e2684601234bbd0e4ea7ffc395c723e11dd09a5ea197fcc7028885
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b